{"71079":{"#nid":"71079","#data":{"type":"news","title":"Georgia Tech Releases Cyber Threats Forecast for 2012","body":[{"value":"\u003Cp\u003EATLANTA \u2013 Oct. 11, 2011 \u2013 The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today\u0027s release of the \u003Ca href=\u0022http:\/\/gtsecuritysummit.com\/report.html\u0022 target=\u0022_blank\u0022\u003EGeorgia Tech Emerging Cyber Threats Report for 2012\u003C\/a\u003E. The report was released at the annual \u003Ca href=\u0022http:\/\/gtsecuritysummit.com\/\u0022 target=\u0022_blank\u0022\u003EGeorgia Tech Cyber Security Summit\u003C\/a\u003E, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.\u003C\/p\u003E\u003Cp\u003EAccording to GTISC, GTRI and the experts cited in the report, specific threats to follow over the coming year include, among others:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESearch Poisoning\u003C\/strong\u003E \u2013 Attackers will increasingly use SEO techniques to optimize malicious links among search results, so that users are more likely to click on a URL because it ranks highly on Google or other search engines.\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EMobile Web-based Attacks \u003C\/strong\u003E\u2013 Expect increased attacks aimed specifically against mobile Web browsers as the tension between usability and security, along with device constraints (including small screen size), make it difficult to solve mobile Web browser security flaws.\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EStolen Cyber Data Use for Marketing\u003C\/strong\u003E \u2013 The market for stolen cyber data will continue to evolve as botnets capture private user information shared by social media platforms and sell it directly to legitimate business channels such as lead-generation and marketing. \u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003E\u201cWe continue to witness cyber attacks of unprecedented sophistication and reach, demonstrating that malicious actors have the ability to compromise and control millions of computers that belong to governments, private enterprises and ordinary citizens,\u201d said Mustaque Ahamad, director of GTISC. \u201cIf we are going to prevent motivated adversaries from attacking our systems, stealing our data and harming our critical infrastructure, the broader community of security researchers\u2014including academia, the private sector and government\u2014must work together to understand emerging threats and to develop proactive security solutions to safeguard the Internet and physical infrastructure that relies on it.\u201d\u003C\/p\u003E\u003Cp\u003EToday\u2019s Georgia Tech Cyber Security Summit is one forum where the IT security ecosystem can gather together to discuss and debate the evolving nature of cyber threats, and to chart the course for creating solutions through collaborations among industry, government and academia. The Summit was keynoted by Admiral William J. Fallon, U.S. Navy (retired) and included a panel of security experts from Equifax, The Financial Services Roundtable, Mobile Active Defense, Reputation.com and GTRI.\u003C\/p\u003E\u003Cp\u003E\u0022Our adversaries, whether motivated by monetary gain, political\/social ideology, or otherwise are becoming increasingly sophisticated and better funded,\u201d said Bo Rotoloni, director of GTRI\u2019s Cyber Technology and Information Security Laboratory (CTISL). \u201cActing as individuals or groups, these entities know no boundaries, making cyber security a global problem. We can no longer assume our data is safe sitting behind perimeter-protected networks. Attacks penetrate our systems through ubiquitous protocols, mobile devices and social engineering, circumventing the network perimeter. Our best defense on the growing cyber warfront is found in cooperative education and awareness, best-of-breed tools and robust policy developed collaboratively by industry, academia and government.\u201d\u003C\/p\u003E\u003Cp\u003EThe Georgia Institute of Technology is one of the nation\u0027s leading public research universities and the home of groundbreaking cyber security research and academic initiatives through GTISC, GTRI and other facilities across campus. These efforts are focused on producing technology and innovation that will help drive economic growth, while improving human life on a global scale. \u003C\/p\u003E\u003Cp\u003E###\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout the Georgia Tech Information Security Center\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EThe Georgia Tech Information Security Center, a National Center of Academic Excellence in Information Assurance Education, is an interdisciplinary center involving faculty from the College of Computing, School of Electrical and Computer Engineering, Georgia Tech Research Institute (GTRI), the Sam Nunn School of International Affairs and the School of Public Policy.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.gtisc.gatech.edu\u0022 target=\u0022_self\u0022\u003Ehttp:\/\/www.gtisc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout the Georgia Tech Research Institute (GTRI) \u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EFor more than seventy-seven years, the Georgia Tech Research Institute (GTRI) has built a reputation as one of the world\u2019s premier applied research and development organizations. Each day, GTRI\u2019s science and engineering expertise is used to solve some of the toughest problems facing government and industry across the nation and around the globe.\u0026nbsp; A non-profit research institute, GTRI teams with its customers to attack their problems with passion and objectivity. In 2011, GTRI was awarded more than $205 million in sponsored research contracts from government and industry.\u003C\/p\u003E\u003Cp\u003EGTRI\u2019s nearly 1,600 expert scientists, engineers and other professionals spend each day turning ideas into action. Much of GTRI\u2019s research takes place within eight uniquely focused research laboratories.\u0026nbsp; Among them is the Cyber Technology and Information Security Laboratory (CTISL) which conducts applied research focused on secure information systems, network vulnerability and mission assurance within the cyber domain. GTRI and Georgia Tech\u2019s academic units have complementary missions and work together to solve real-world problems. As an integral part of Georgia Tech, GTRI opens the door to the vast intellectual resources of one of America\u2019s leading research universities.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.gtri.gatech.edu\u0022 target=\u0022_self\u0022\u003Ehttp:\/\/www.gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Searh poisoning, mobile attacks expected to increase in coming year"}],"field_summary":[{"value":"\u003Cp\u003EATLANTA \u2013 Oct. 11, 2011 \u2013 The year ahead will feature new and \nincreasingly sophisticated means to capture and exploit user data, as \nwell as escalating battles over the control of online information that \nthreatens to compromise content and erode public trust and privacy. \nThose were the findings made by the Georgia Tech Information Security \nCenter (GTISC) and the Georgia Tech Research Institute (GTRI) in today\u0027s\n release of the Georgia Tech Emerging Cyber Threats Report for 2012. \u003Cem\u003ESource: Office of Communications\u003C\/em\u003E\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27174","created_gmt":"2011-10-11 08:38:39","changed_gmt":"2016-10-08 03:10:26","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2011-10-11T00:00:00-04:00","iso_date":"2011-10-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"415","name":"Georgia Tech Research Institute"},{"id":"2254","name":"gtisc"},{"id":"416","name":"GTRI"},{"id":"2678","name":"information security"},{"id":"11017","name":"Mustaque Ahamad"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBrendan Streich\u003C\/p\u003E\u003Cp\u003E404-894-7253\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:bstreich@cc.gatech.edu\u0022\u003Ebstreich@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":["bstreich@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}